Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Intel Subscribe
Filtered by product Ac 3165 Firmware
Total 26 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-0063 1 Intel 30 7265, 7265 Firmware, Ac1550 and 27 more 2021-11-19 6.1 MEDIUM 6.5 MEDIUM
Improper input validation in firmware for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVE-2021-0053 1 Intel 30 7265, 7265 Firmware, Ac1550 and 27 more 2021-11-19 2.7 LOW 5.7 MEDIUM
Improper initialization in firmware for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an authenticated user to potentially enable information disclosure via adjacent access.
CVE-2019-14620 1 Intel 22 Ac 3165, Ac 3165 Firmware, Ac 3168 and 19 more 2020-08-19 3.3 LOW 6.5 MEDIUM
Insufficient control flow management for some Intel(R) Wireless Bluetooth(R) products may allow an unprivileged user to potentially enable denial of service via adjacent access.
CVE-2020-0554 2 Intel, Microsoft 14 Ac 3165 Firmware, Ac 3168 Firmware, Ac 7265 Firmware and 11 more 2020-08-19 3.7 LOW 7.0 HIGH
Race condition in software installer for some Intel(R) Wireless Bluetooth(R) products on Windows* 7, 8.1 and 10 may allow an unprivileged user to potentially enable escalation of privilege via local access.
CVE-2020-0553 2 Intel, Microsoft 12 Ac 3165 Firmware, Ac 3168 Firmware, Ac 7265 Firmware and 9 more 2020-08-19 2.1 LOW 4.4 MEDIUM
Out-of-bounds read in kernel mode driver for some Intel(R) Wireless Bluetooth(R) products on Windows* 10, may allow a privileged user to potentially enable information disclosure via local access.
CVE-2020-0555 1 Intel 22 Ac 3165, Ac 3165 Firmware, Ac 3168 and 19 more 2020-08-19 4.6 MEDIUM 7.8 HIGH
Improper input validation for some Intel(R) Wireless Bluetooth(R) products may allow an authenticated user to potentially enable escalation of privilege via local access.